Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for counterfeiting protection

a counterfeiting protection and method technology, applied in the field of counterfeiting protection, can solve the problems of counterfeit medicines having a fatal effect on the health of patients, certain counterfeit goods can have adverse, if not fatal, effects on the health of consumers, and many mor

Active Publication Date: 2010-07-20
CHEMIMAGE TECH LLC
View PDF24 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

"The patent text describes a method for providing counterfeiting protection for an object by affixing an identifying mark with an encrypted feature. The method involves reading the identifying mark to obtain a set of information, transmitting the information to a remote location, and receiving a second set of information from the remote location. The second set of information is used to determine the authenticity of the object. The method can also involve using an identifying mark with a first portion and a second portion, where the second portion includes the encrypted feature. The patent also describes an improved method for providing counterfeiting protection by accessing the remote location during manufacture of the object to receive data pertaining to the encrypted feature. The technical effects of the patent text include increased security against counterfeiting and improved authenticity verification of objects."

Problems solved by technology

While all counterfeit products adversely effect the bona fide manufacturers' profitability, certain counterfeit goods can have an adverse, if not fatal, effect on the consumer's health.
For example, a counterfeit medicinal product can have a fatal effect on a patient's health if it includes inappropriate dosage of the active ingredient.
While this type of counterfeiting is a problem, what is much more troubling is the fact that counterfeiters are now infiltrating the supply chain that exists between the manufacturer and the distribution point to the consumer, such as a neighborhood pharmacy.
Consequently, unsuspecting and unwitting doctors, pharmacists, and consumers who think that they are prescribing, distributing, and consuming authentic products are actually being duped into dealing with counterfeit products.
This method of counterfeiting is especially insidious and dangerous and has the potential to ruin the trust doctors, pharmacists, and consumers have in the products that are being prescribed let alone the harm caused to the consumer by consuming products that are potentially harmful.
Furthermore, counterfeiting by placing fraudulent products that are seemingly real into the supply chain for authentic products is in no way limited to drugs and medical products.
Thus, the potential for harm due to supply chain counterfeiting is enormous.
These distribution channels have a responsibility to provide authentic products and would face substantial liabilities should they dispense a counterfeit product.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for counterfeiting protection
  • Method and apparatus for counterfeiting protection
  • Method and apparatus for counterfeiting protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026]FIG. 1A is a schematic representation of a conventional two-dimensional (2D) barcode. In FIG. 1A, barcode 100 is a 2D barcode having a vertical dimension and a horizontal dimension. Each of the horizontal and the vertical dimensions of barcode 100 include rows 1-15 and column 1-15. Information can be encoded and stored in each of the two dimensions of barcode 100. Conventional barcodes include information such as the product's manufacturing date, manufacturing location, batch number, etc. The barcode information (or other identifying marks) can be placed on the product and / or its packaging.

[0027]Because conventional barcodes can be easily replicated by counterfeiters, in one embodiment of the disclosure a barcode may contain encrypted information (or an encryption feature) in addition to the conventional information. The encrypted feature or features can be configured to be invisible to the naked eye or to the conventional barcode scanners. That is, the encrypted feature can b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The disclosure relates generally to methods and apparatus for protecting against counterfeit products and for methods and apparatus for providing counterfeiting protection for an object. In one embodiment, the method includes the steps of: (a) accessing an object including an identifying mark having a first portion and a second portion wherein said second portion includes an encrypted feature; (b) reading the first portion to thereby obtain a first set of information; (c) transmitting the first set of information to a remote location; (d) receiving from the remote location a second set of information; and (e) reading the second portion using the second set of information to thereby determine the authenticity of the object.

Description

PRIORITY INFORMATION[0001]The instant disclosure claims the filing-date benefit of Provisional Application No. 60 / 754,324 filed Dec. 29, 2005 (entitled “System and method for anti-counterfeiting using chemical imaging”), Provisional Application No. 60 / 777,852, filed Mar. 1, 2006 (entitled: “Anti-counterfeiting business model”), and Provisional Application No. 60 / 784,042 filed Mar. 20, 2006 (entitled: “Two- and Three-Dimensional Bar Codes with Invisible Encryptions”). The disclosure of each of these applications is incorporated herein in its entirety.CROSS-REFERENCE TO RELATED APPLICATIONS [0002]Cross-reference is made to the following related U.S. application Ser. Nos. 11 / 641,666; 11 / 641,671; 11 / 641,669; and 11 / 641,667 all filed concurrently herewith and entitled “Method and Apparatus for Counterfeiting Protection” and which are also Incorporated herein by reference in their entirety.BACKGROUND[0003]Counterfeiting is on the rise. The accessibility of production markets with little o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): G06K15/00G06F19/00G06Q30/00G06Q90/00
CPCG06K19/06037G06K19/06046G06K19/10G06K19/14G06K15/00
Inventor TUSCHEL, DAVIDHUTCHISON, WESLEY H.VOIGT, THOMAS C.
Owner CHEMIMAGE TECH LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products